Printer-friendly copy Email this topic to a friend
Lobby High-Tech topic #306449

Subject: "I use Lastpass , should I switch?" Previous topic | Next topic
handle
Charter member
18951 posts
Thu Jan-05-23 12:09 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
"I use Lastpass , should I switch?"


          

Any opinions?

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top


Topic Outline
Subject Author Message Date ID
yes.
Jan 06th 2023
1
I have 1 month left on Lastpass
Jan 09th 2023
2
I installed 1Password and Bitwarden
Jan 10th 2023
3
Work blocked 1Password and Bitwarden Edge Extenstions
Jan 10th 2023
4
Bitwarden does everything I need (and free)
Jan 15th 2023
5
I've been a 1password user for years (7+) and it's been great
Jan 30th 2023
6
I heard someone talk about using Lastpass in a video about international...
Feb 06th 2023
7
The passwords you store don't have to be the actual ones
Feb 07th 2023
8
don't do this (never roll your own crypto)
Feb 11th 2023
10
      I don't, but it won't hurt if done right - right??
Feb 13th 2023
11
           it's a false sense of security, which is worse
Feb 14th 2023
12
           patterns are bad.
May 06th 2023
13
conditional access policies...but LP's issue was their response (like rj...
Feb 11th 2023
9
I use dashlane.
May 06th 2023
14

Rjcc
Charter member
94964 posts
Fri Jan-06-23 11:21 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via AOL IM
1. "yes."
In response to Reply # 0


          

I don't like the way they've handled this from a security standpoint and especially not from a disclosure standpoint.

I switched to 1password a few years ago and I like it just fine

for people who don't like their subscription pushing, bitwarden seems to work well

www.engadgethd.com - the other stuff i'm looking at

  

Printer-friendly copy | Reply | Reply with quote | Top

    
handle
Charter member
18951 posts
Mon Jan-09-23 05:04 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
2. "I have 1 month left on Lastpass"
In response to Reply # 1


          

I'm trying 1Password this week, I'll try Bitwarden next week.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

handle
Charter member
18951 posts
Tue Jan-10-23 09:30 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
3. "I installed 1Password and Bitwarden"
In response to Reply # 0


          

Both easily imported my faults.

Both seem to have roughly the features I am looking for:
Browser Extension
iOS keyboard autofill
FaceID and/or PIN unlock on phone

Bitwarden is free, or $10 a year if you go premium.
1Password is not, but it is cheap.

I found this article which kind of explains the differences, and they are minor.

I think I'm leaning Bitwarden because I could create an account for my mother for free and try to get her to use it.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

    
handle
Charter member
18951 posts
Tue Jan-10-23 10:12 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
4. "Work blocked 1Password and Bitwarden Edge Extenstions"
In response to Reply # 3


          

But LastPass is not blocked.

Also none are blocked in Chrome.

Going to have to talk to the security department - but I fear they'll just say "Thanks, we'll block them all in all browsers!!"

We use a different local manager for our passwords at work.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

handle
Charter member
18951 posts
Sun Jan-15-23 12:01 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
5. "Bitwarden does everything I need (and free)"
In response to Reply # 0


          

First, I didn't save the "secret code" for 1Password and I'm locked out and don't want to even give it another shot.

Bitwarden:
It imported my LP vault, including secure notes.

Browser extension works well.
iOS extension works and supports PIN and/or Facetime.

Wish it did these things better:
You must right click on the fields, LastPass put a control in the fields.

Browser extension timeout defaults to "On browser restart. "You can change it in settings, but LastPass had that choice available in a pulldown when you unlocked your vault - which I liked.


So I'll probably stick with BitWarden and pay the $10 a year as a tip.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

Steelysteel
Charter member
4926 posts
Mon Jan-30-23 09:36 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via AOL IM
6. "I've been a 1password user for years (7+) and it's been great"
In response to Reply # 0


  

          

I tried Bitwarden, but there were some UI quirks that bugged me. Moved the family over to 1PW and haven't looked back.

I deleted my empty LastPass vault & account last week.

http://www.twitter.com/steelysteel

  

Printer-friendly copy | Reply | Reply with quote | Top

normal35762
Member since Oct 20th 2004
13246 posts
Mon Feb-06-23 05:46 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
7. "I heard someone talk about using Lastpass in a video about international..."
In response to Reply # 0


  

          

When you are in another country trying to access apps that normally work in the USA but ask for further layers of security when abroad. I don't know much about it. Sounds like a cool concept but in the back of my mind I am thinking this type of store all passwords in one place is an accident waiting to happen.

  

Printer-friendly copy | Reply | Reply with quote | Top

    
handle
Charter member
18951 posts
Tue Feb-07-23 03:35 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
8. "The passwords you store don't have to be the actual ones"
In response to Reply # 7


          

You can always salt them manually.

Like leave out the first of last few characters and then have a system where you know those last 3, or 4, or whatever.

Example of manual salt:
Say the company name for the site is Google, which has 5 characters.

Store the password like this:r9!234Y54

But the password is actually GLE-r9!234Y54-5#

Which is the last 3 letters of the company in caps and a dash prepended, then append - and the number of letters in the company name and a nonsense character.

People who don't know the system won't be able to guess it easily, especially if you use swap between techniques. Like think of a few and use them randomly.

If you forget which one you use you can always try the next one.

But you'll have the "meat" of the password easily stored.

I think the biggest vulnerability is the normal/easy two factor code sending - I think they could intercept an SMS or email easier than hacking an encrypted file.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

        
nonaime
Charter member
3117 posts
Sat Feb-11-23 08:34 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
10. "don't do this (never roll your own crypto)"
In response to Reply # 8
Sat Feb-11-23 08:43 PM by nonaime

          

>People who don't know the system won't be able to guess it easily, especially if you use swap between techniques. Like think of a few and use them randomly.

There are wordlist generators that will scrape corporate websites / stuff you put on social media/ etc to generate randomized wordlists. You can then use another program to incorporate that list in its hash bruteforcing routine.

If your password/passphrase is long enough, tricks like these don't get you anything...unless you do something like storing only 4 or 5 characters in your PM and keep the remaining 10 or 20 characters in your head. But why use a password manager at that point? and if the part of the password you have in your head isn't unique, game over (changing up one or two characters don't count)

If your password is short...adding an easily (more than you would suspect) guessed/discoverable pattern to it, won't make it more secure.

If you're going to use a password manager,just make sure the master password is good, use 2fa (to help stop online attacks), and bump the key derivation iteration count as high as you can tolerate in the password manager, and let the password manager create long (which is the important thing) complex passwords for you.

~~~~~~~~
A bad Samaritan averaging above average men (c) DOOM

  

Printer-friendly copy | Reply | Reply with quote | Top

            
handle
Charter member
18951 posts
Mon Feb-13-23 01:32 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
11. "I don't, but it won't hurt if done right - right??"
In response to Reply # 10
Mon Feb-13-23 01:38 PM by handle

          

>If your password is short...adding an easily (more than you
>would suspect) guessed/discoverable pattern to it, won't make
>it more secure.

It won't hurt either.

But the most important thing is using random passwords that are sufficiently long - I do use the password manager to generate those.

Most sites will allow 12-14 characters for the password. Make sure you include A-Z, 0-9, and symbols (!@#$%) if allowed and multiple of each if possible. The length is more important that the characters.

Also make sure your second factor is secure. If they get control of your email address and a factor that can be used is email then you're toast.

My thinking:

^gK*9$sdvD&6Uo is a better password that MyP@ass11.
PersonWomanManCameraTVIsHeFuckingKiddingMe is a better password than ^gK*9$sdvD&6Uo. (Or maybe they are equal.)

Goo-^gK*9$sdvD&6Uo-1 is better than ^gK*9$sdvD&6Uo. (Or maybe they are equa but it can put the posters mind at ease.)

Goo-easypass-1 is worse than ^gK*9$sdvD&6Uo.

Edit: https://bitwarden.com/password-strength/

Take this with a grain of salt.

------------


Gone: My Discogs collection for The Roots:
http://www.discogs.com/user/tomhayes-roots/collection

  

Printer-friendly copy | Reply | Reply with quote | Top

                
nonaime
Charter member
3117 posts
Tue Feb-14-23 05:18 AM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
12. "it's a false sense of security, which is worse"
In response to Reply # 11
Tue Feb-14-23 05:38 AM by nonaime

          

>>If your password is short...adding an easily (more than you
>>would suspect) guessed/discoverable pattern to it, won't
>make
>>it more secure.
>
>It won't hurt either.

Yes it does. Because it leads you to believe that you're more secure than you really are. Example, Cloud-based Password Manager company sends out a note saying they were compromised, hackers got all the vaults, and they recommend changing any stored secrets. But you go, nah...I got my secret thing I do with my passwords, so I'm good.

No, that's how you get got. Like i said before, there are programs that can be scripted to handle the password routine you've described...probably a dozen py scripts on github that tackle this.

just make a longer passphrase / long complex password.

>But the most important thing is using random passwords that
>are sufficiently long - I do use the password manager to
>generate those.

This is the way.

>Most sites will allow 12-14 characters for the password. Make
>sure you include A-Z, 0-9, and symbols (!@#$%) if allowed and
>multiple of each if possible. The length is more important
>that the characters.

There's an "old infosec-wives-tale" that there's a cutoff where once you get past a certain number of characters, complexity rules don't matter (I mean if it takes 100 years vs 100000000 years...does it really matter if I force you change your password every x months). Of course, we have to re-evaluate this notion every new crop of GPUs that come out (and this reminds me that I need to revisit our policy)

>Also make sure your second factor is secure. If they get
>control of your email address and a factor that can be used is
>email then you're toast.

yubikey or authenticator app (with backup keys/device). Email gets compromised too easily(see:yahoo...yesteryear's gmail...for folks chuckling at yahoo)

>My thinking:
>
>^gK*9$sdvD&6Uo is a better password that MyP@ass11.
>PersonWomanManCameraTVIsHeFuckingKiddingMe is a better
>password than ^gK*9$sdvD&6Uo. (Or maybe they are equal.)

yup...the longer passphrase would be better (just keep in mind AI predicting what words come next in a passphrase...so don't be too predictable)

>Goo-^gK*9$sdvD&6Uo-1 is better than ^gK*9$sdvD&6Uo. (Or maybe
>they are equa but it can put the posters mind at ease.)

No no no...false sense of security. worse. it makes you not take actions that you should take when notified of a breach. Otherwise, what is this "peace of mind"? that you don't have to do anything when you hear a service you used was breached? not good.

>Goo-easypass-1 is worse than ^gK*9$sdvD&6Uo.

...and this is why these routines are bad ideas, because someone is going to try Goo-easypass-1 (just like folks used P@ssw0rd!...cuz it's complex). And when that password gets cracked, the attacker is going to go, "oh, this is what folks are doing...let me alter my script". And now Goo-^gK*9$sdvD&6Uo-1 is just as easily cracked as gK*9$sdvD&6Uo, since I know what the pattern is...you may have set back the cracking effort by weeks, maybe even months (since I have to try combinations of different schemes folks come up with)...but no where near as long if you just went with a proper long and complex password.

>Edit: https://bitwarden.com/password-strength/
>
>Take this with a grain of salt.

NIST (National Institute for Science and Technology) SP 800 series focuses on cyber/information assurance and is what federal agencies and folks that interact with federal systems / data follow (and even if you don't, are good guidelines to follow).

NIST SP 800-63 has guidance on passwords/authenticators. Providing users with the relative strength of their passwords is a recommendation of theirs, so it is great to see bitwarden has a webtool that does this.

~~~~~~~~
A bad Samaritan averaging above average men (c) DOOM

  

Printer-friendly copy | Reply | Reply with quote | Top

                
tariqhu
Charter member
17892 posts
Sat May-06-23 07:06 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via AOL IM
13. "patterns are bad."
In response to Reply # 11


          

hackers will figure that out that type of 'salt'. the purpose of salting is helping with randomization. otherwise, adding your own patterns will be figured out quickly.

Y'all buy those labels, I was born supreme

  

Printer-friendly copy | Reply | Reply with quote | Top

    
nonaime
Charter member
3117 posts
Sat Feb-11-23 07:41 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
9. "conditional access policies...but LP's issue was their response (like rj..."
In response to Reply # 7


          

>When you are in another country trying to access apps that normally work in the USA but ask for further layers of security when abroad.

You can enforce different security controls based on conditions (e.g.; someone logs in from a location where they normally don't...boom captcha and/or force a 2fa challenge)

>Sounds like a cool concept but in the back of my mind I am thinking this type of store all passwords in one place is an accident waiting to happen.

There are risks involved, for sure (but nothing is zero risk...unless you just don't do things on the internet).

Outside of LastPass' fumbling of the incident, these password management platforms really are designed to slowdown someone abusing the secrets being stored (hinges, usually, on master password strength and pbkd iteration count). There are captchas and 2fa to slow down unauthorized folks from breaking down the front door. Then there's the key derivation function itself (slows down bruteforcing of passwords)...you'll see an iteration count in settings somewhere in the password manger...the larger, the better...of course, the larger it is slows you down too (but you aren't trying to guess your password...so it has a much more drastic effect on brutefore attempts)

When it comes to the master passwords, just follow best practices (this isn't from me, this is from the people I follow to do my job...NIST): "Choose a long passphrase for the master password to the password manager and protect it from being stolen. A passphrase can be made sufficiently long to protect against attacks while still allowing memorization." (https://pages.nist.gov/800-63-FAQ/#q-b10)

When it comes to creating / storing passwords, just let the password manager do its thing...you aren't buying yourself anything by adding numbers and other easily guessable patterns to the password to an already long password generated by the password generator.

~~~~~~~~
A bad Samaritan averaging above average men (c) DOOM

  

Printer-friendly copy | Reply | Reply with quote | Top

tariqhu
Charter member
17892 posts
Sat May-06-23 08:39 PM

Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via AOL IM
14. "I use dashlane."
In response to Reply # 0


          

pretty good so far.

Y'all buy those labels, I was born supreme

  

Printer-friendly copy | Reply | Reply with quote | Top

Lobby High-Tech topic #306449 Previous topic | Next topic
Powered by DCForum+ Version 1.25
Copyright © DCScripts.com